Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 20:58

General

  • Target

    b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe

  • Size

    212KB

  • MD5

    2b3a6012b42172a7ba03a220f50bc13b

  • SHA1

    b50678f42f08dbf12633b9ad0e2c09d2182905b7

  • SHA256

    b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d

  • SHA512

    8edd83146c45d5e486bc411649f148216944bb8e6e9055d5852a33395999ddd4457b5cbcf6ba1114a750ac9f750153beaa73f9718307fde680d39f12df2765f6

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmG:dHp/urb4A1WdBfp

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1292
    • \??\c:\Program FilesCDJ6E2.exe
      "c:\Program FilesCDJ6E2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:788
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1388
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program FilesCDJ6E2.exe

    Filesize

    36KB

    MD5

    f95253948aaee5060a4ab17abd4a29cf

    SHA1

    dbe05b511ae47f3b3d23e57b5e888de50275910a

    SHA256

    d034004b52d2a544f05c5884de7662bd7df6457a513f501b863aeb9fac6b1059

    SHA512

    2aa844d1effa0287da676b636b6666a6c01b4e5ba1b738ac843c60357a7c54f774b641feb4d764206a3f7256005e28135f131e100d385557884be4c3f71e6a99

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{388D2101-6B8C-11ED-9201-42465D836E7B}.dat

    Filesize

    5KB

    MD5

    bc47b4798c919bd0c0408b8be6867b5f

    SHA1

    409ebf7c2b00b61d93ab95d1180e57fdfa288d96

    SHA256

    a888c629020b31d45345ca12c4bac12e839eaa55258fe7899aa709c07f7b386d

    SHA512

    027d9297763b744d88fee73a2e1723969a78b480a8a4febd2c86548ac46528673ba2ca898787c969dd28f310ca3071db6d7cf4a057d32f24288a4935e4a6dde1

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    d92b2c577e84a9ecb8cb58d9a4da5fcf

    SHA1

    7a992a0f45d2918c5666de1420a7f033f2905d20

    SHA256

    6d712e89c8e837129d4c965789b38bbdf41afac77e221f39de2d95dd5831bd17

    SHA512

    f8b146fac6a084876fece5d43b1168bab0c6fee340baaea730a02d7c81bc189802d41ec124ab2b06ba5f4fd7af5ed6b5d03a1fbc409f690f7a033663a6f737c3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RGE62UIS.txt

    Filesize

    603B

    MD5

    56d5f36c54f59f712005207aeeaf51fb

    SHA1

    2252e4a16b19ec17ccc9e5880e0138f1c7b49049

    SHA256

    39267c505b6f5c946ae2c06636fc136018761fdebd3d1a9fdb59b427cfe665ee

    SHA512

    e76518c35eba4971bb49090cab5f09aa099225543bdf6b26c98b9bbcaacc778cd4ce0c6f48063e6744302bdacc312a33aa294bd1cafd3d8d5161418e120f3702

  • memory/1292-56-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB

  • memory/1504-62-0x0000000000000000-mapping.dmp

  • memory/2032-57-0x0000000000000000-mapping.dmp